• Tidak ada hasil yang ditemukan

Enhanced Route Discovery Mechanism of Ad

N/A
N/A
Protected

Academic year: 2018

Membagikan "Enhanced Route Discovery Mechanism of Ad"

Copied!
10
0
0

Teks penuh

(1)

RESEARCH ARTICLE

Enhanced Route Discovery Mechanism of Ad-Hoc

On Demand Distance Vector for MANET

May Sayed A. Nouh

Electronics & Communications Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt.

may.nouh@yahoo.com

Salwa H. El-ramly

Electronics & Communications Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt.

salwahelramly@gmail.com

M. Zaki

Computers and Systems Department, Faculty of Engineering, Al Azhar University, Cairo, Egypt.

mzaki.azhar@gmail.com

Husein A.A Elsayed

Electronics & Communications Department, Faculty of Engineering, Ain Shams University Cairo, Egypt.

helsayed@eng.asu.edu.eg

Published Online: 15 November 2016

Abstract – The Ad-hoc On Demand Distance Vector (AODV) is one of the most famed reactive routing protocols, which is used in Mobile Ad Hoc Networks (MANETs) for routing purposes, where the routes are built only when it is required. The AODV is related to the problem of route constructing and maintaining among any two-node in the presence of the dynamic topology of a network. High routing control packets, during route construction, is a limiting factor of AODV. Also, the route created during route discovery process may not be optimum (in terms of the number of hop counts between the originating and target node). The construction of non-optimal route arises from many reasons such as temporary congestion of one or more links in the short path to the target node, or nodes in those paths may contend the channel late, or the nodes may be busy for that moment to entertain other engagement. Moreover, during the route discovery phase, a large amount of unnecessary control packets may be generated which result in the debasement of the performance and the efficiency of the protocol by congesting the network and increasing the overhead. In this article the cases at which non-ideal routes are created and unimportant control packets generated during route discovery process will be identified. The modified AODV (AODV_MOD) with enhanced route discovery mechanism is proposed that will be used to avoid these cases by suppressing unimportant control packets and avoiding non-ideal routes formation. Simulation results, conducted in network simulator (NS2), prove the skillfulness of the proposed enhanced route discovery scheme from point of view of packet delivery ratio, end-to-end delay, and normalized overhead.

Index Terms – Overhear, AODV, DSR, DSDV, RREQ, RREP, Broadcast, Collision and Overhear.

1. INTRODUCTION

"Mobile Ad hoc Network" is a wireless network, in which the nodes are allowed to move freely in any direction. Due to the node mobility, a node can insert or depart the network at any time. If the two communicating nodes are within the same area of their transmission range, the routing is not needed. Otherwise, other intermediate nodes are required to realize the function of routers to set up a route in a hop-by-hop manner between the two nodes [1, 2]. The aim of a routing algorithm is to specify a procedure to transfer a data packet from the originating to target node. To make correct routing decision, the routing algorithm must select some criteria for making routing decision, (e.g., bandwidth, number of hop counts, transmission power, etc.)

Due to the nodes mobility, the exchanged routing information between nodes should be modified to reflect changes in network topology, so the conventional routing algorithms of the wired/wireless networks cannot be used directly in MANET. There are different algorithms to follow up the variability of topology of network and to rediscover new routes when the old routes fail. MANET has two fundamental sorts of

"routing protocols": “Proactive routing protocols”, and “Reactive routing protocols” [3-6]. “Proactive routing

protocols” (e.g. , “DSDV” and “OLSR”), also called “table driven” routing protocols, in which the routing information

(2)

RESEARCH ARTICLE

contrast, in "reactive routing protocols" (e.g., "AODV" and

"DSR"), also called "on demand routing protocols”, instead of

exchanging routing information among nodes at regular intervals, the route establishing solely in case of being needed.

”Reactive routing protocols” shun the cost of routes

maintenance which are not being used and also never send excessive control packets. Therefore, "reactive routing protocols" do well than "proactive routing protocols".

"Ad hoc On Demand Distance Vector (AODV)" is an efficient reactive scheme for routing purpose [7]. It depends on the hops

style. For route discovery, “AODV” uses only two guidance packets, “Route Request packet (RREQ)” and “Route Reply packet (RREP)”. To establish route between any two nodes,

"RREQ" is sent from the originating node. When "RREQ" reaches the target node, it answers by transmitting "RREP" to originator to confirm the establishment of the route.

AODV protocol has some advantages such as the route creation

is "on demand" and the usage of “destination sequence number”, as time stamp, for getting most recent route to the

target node. Moreover, for route maintenance, the hello packets are used and they do not cause significant unimportant control packets in the network because they are range limited. The disadvantage of AODV protocol is the heavy control packets due to the flooding of RREQ packet and multiple unnecessary RREP packets for responding to a single RREQ packet during the route discovery phase [8]. Also, the selected route may not be optimum (in terms of hops number between the originator and target).

This article aims to signify the cases at which non-ideal routes are created and unimportant RREP is generated during route discovery process in AODV and to propose and test a solution that will be used to avoid or to eliminate these cases by suppressing unimportant RREPs and avoid non-ideal routes that are to occur.

The remaining structure of the article is as follow: In Section 2, the related work of various routing methods has been discussed. The AODV protocol is briefly reviewed in Section 3. Then Section 4 reports the cases at which non-ideal routes are created and unimportant RREP is generated during route discovery process in AODV. The proposed technique for suppressing unimportant route reply (RREP) packets and avoiding non-ideal route creation is presented in Section 5. In Section 6, the simulation environment and performance metrics are given. The simulation results and analysis are then presented in Section 7. Finally, we conclude the paper in Section 8.

2. RELATED WORK

P. Wannawilai and C. Sathitwiriyawong [9] introduced new scheme, called (AODV-SBA). Where, routes are being discovered by the method that shuns congestion and

minimizing extravagant routing overheads. The idea of suggested scheme is based on measuring congestion of local network by using information from the MAC sub-layer. Hence, precluding the congested routes from being discovered. So, the proposed technique improves the performance of a high congested network

A. Abu-Ein and J. Nader [10] proposed a modified version of the original AODV, called (PH-AODV) routing protocol. Where, route selection is based on two factors: the power level of node and the hops number. So that, selected route should consist of relatively minimum hops number and the nodes forming the route must have high power level. Hence, performance of suggested scheme does well off the original "AODV" from point of view of "end-to-end delay", "packets dropping" and "throughput".

Julith Jacob and Shinu Koyakutty [11] presented a novel algorithm, named "Nominated Neighbors to Rebroadcast the RREQ (NNRR)", to minimize the surplus of "RREQ packets" during "route discovery". The proposed algorithm depends on the information of the location of the nodes inside the network. To limit the route discovery area, the proposed algorithm chooses four neighboring nodes as elected nodes to rebroadcast the "RREQ packet" in case of these nodes have not available path to the target node and applies the idea of "expected and requested zone" of "LAR protocol". The developed algorithm results in reduction of the "routing control packets".

Priyaganga G. and Madhumita C. [12], introduced a novel algorithm to reduce routing overhead in MANET. The proposed technique permits the intermediate node to rebroadcast the RREQ based on a newly computed factor, called efficient rebroadcast delay, DR. This factor is a function

of three network parameters, link quality (in terms of S/N ratio) between the nodes, energy level and routing load at each node. Hence, the node efficiency is determined according to the value of its rebroadcast delay, which is located between 0 and 1. If 0<DR<1, then the intermediate re-broadcast (RREQ).

Otherwise discard (RREQ). The proposed algorithm results in the discovery of reliable and stable route with minimum routing load.

3. AD-HOC ON-DEMAND DISTANCE VECTOR (AODV)

“AODV” is “reactive routing protocol” [7, 13, and 14].

Therefore, routes are established only when it is required (i.e.,

on demand). “AODV” composed of 2- stage: “route discovery”

and “route maintenance”.

(3)

RESEARCH ARTICLE

originator in its route cache. Among RREQ fields, "originator address", "broadcast ID" and "destination sequence number" which an originating node knows it [15-17]. When the first "RREQ" reaches any intermediate node does not possess valid route to the target node. It rebroadcast the "RREQ". Based on the "originator address" and "broadcast ID", nodes can avoid duplication of receiving the same "RREQ". If nodes received

the same “RREQ” two times, the later comer will be discarded

and do not resend it. On the other hand, when the "RREQ" reaches the target node or any intermediate node has valid route to the target node, it transmits "RREP packet", by using the hops style, to the originating node. During journey of "RREP" to the originating node, each intermediate node creates "forward path" to the target node. When the "RREP" reaches the originating node, it stores the route to the target node in the route cache and can begin sending the "data packets" to the target node. If multiple "RREP packets" received by the originating node, the route which have smallest hops number will be selected.

During "data packets" transmission, if link has been failed, the predecessor node from the failed link transmits "Route Error packet (RERR)" to the originating node by hops style. During journey of the "RERR packet" to the originating node, each intermediate node upstream of the failed link disproves routes to any unreachable target node. On receiving "RERR packet", the originating node rejects the failed route from route cache and restarts again "route discovery process".

4. NON-IDEAL ROUTE FORMATION AND UNNECESSARY RREPS GENERATION This section presents the analysis of the problem of non-optimal route discovery in AODV and generation of

unimportant RREPs by taking “Route Request” cycle and “Route Reply” cycle separately.

4.1.Route Request Cycle

In the route discovery process, each node keeps track of "RREQ packets" it has been received, this will help to discard duplicates received from different neighbor nodes. To detect duplication, the nodes use "originator address" and "broadcast

ID" of the “RREQ packet”. If nodes receive “RREQ” more

than one, it will drop late comer whatever hop-count it has.

However, “RREQ” with the smaller number of hop- count may arrive late due to temporary link congestion, channel access

and collision at that time. As a result, “RREQ” which passes

through less number of hops may be dropped because of its late arrival. Thus, a longer (non-ideal) path may be taken as a path for routing the data to the target node. This situation is illustrated, as an example, as shown in Figure 1. When node "S" has the desire to make up communication with node "D". It investigates its "route cache", if it does not found valid route to node "D", then node "S" starts the "route discovery process", by transmitting "RREQ packet" to neighboring nodes (A, E,

K). On receiving the "RREQ" at time t1, assume that the nodes

E and K are busy or the links K-F, K-J, and E-H are temporarily congested or collision occurs in these links. This will results in arriving three "RREQ packets" to the target node "D" at different times. The first one at time t5 through the path

<S-A-B-C-N-D>, the second one at time t7 through the path

<S-K-J-D> and the third one at time t9 through the path

<S-E-H-G-D>. On receiving the first “RREQ” at time t5, target node "D"

immediately transmits "Route Reply (RREP) packet", with hops number =5, to the originating node "S" through the path < D-N-C-B-A-S>, which is not the optimal path/route. And the

other two “RREQs”, which are lately arrived, will be neglected

by node "D". Therefore, the optimal route, with hops number = 3, through <S-K-J-D> does not taken as route between node "S" and "D", but the non-optimal route, < S-A-B-C-N-D>, is selected as route between node "S" and "D".

We have proposed an algorithm that considers all RREQs irrespective of their arrival time at a node and decides based on both the hop-count and “destination sequence number” before dropping a lately arrived RREQ. By considering hop-count, we may avoid the formation of a longer path as a route. The detail of thealgorithm is discussed successively.

Figure1 Non-Optimal Route Formation 4.2.Route Reply Cycle

The second phenomenon that we have observed is the propagation of ineffective RREPs through the network. This happens in some situations at which RREPs generated by intermediate nodes and/or target nodes pass through more hops than other RREPs to reach to the originating node of the respective RREQ, which are dropped by the originator on their arrival based on the comparison of their hop-count. This can be illustrated, as an example, as shown in Figure 2. Whenever node "S" initiates the "route discovery process" by flooding "RREQ packet", it will propagate through network till it arrives to the intermediate node "J" and "G" as well as the target node "D". Assume that each one of intermediate nodes J and G has valid route to the target node "D". On receiving "RREQ packet" at time t6, node "J" sends "RREP packet" to the originating

node "S" through path <J-K-S>, with hop count = 3, at time t5

(4)

RESEARCH ARTICLE

node "D" sends "RRPE packet" through path <D-N-C-B-A-S>, with hop count = 5 and at time t7 node "G" sends "RRPE

packet" through path <G-H-E-S>, with hop count = 4. On

receiving these three “RREPs”, the originating node "S" elects

the "RREP" of the minimum hops count, (i.e. "RREP" of node

“J”, with hops count = 3, through path <J-K-S>). The other two

"RREPs" of “G” and “D” will be dropped on their arrival at the

originating node "S" where, they contain larger hops count. However, these two "RREPs" were flooded the network to reach to the target node "S", so this may increase the "routing overhead" and congest the network unnecessarily which will not result in route to the required target. They might even cause long route to occur which is taken as route between the two nodes if the "RREP" following the short path is dropped due to collision or other. Problem of the unnecessary "RREPs" will have significant drawback in case of high- density "Ad-hoc network". Solution for the stated problem is also added in the proposed algorithm which is discussed in the following section.

Figure 2 Generation of Unnecessary RREP 5. AODV WITH ENHANCED ROUTE DISCOVERY

MECHANISM

Based on the above-mentioned problems, we have proposed a solution that may helpful to enhance the route discovery mechanism. The proposed solution is based on two main ideas. The first one is based on the concept of Overhear RREP packet [18-20], which is the feature of DSR routing protocol used by a node to learn more routes from RREP packets that are not directed to it by promiscuous listing. The second idea is that all the RREQs should be processed and evaluated by a node irrespective of their arrival time. The proposed solution is discussed in the following two cases:

5.1.Non - Optimal Route Suppression

For the case at which non-optimal route is to occur, we have proposed an algorithm that may suppress the non-optimal route which is to be built, so that optimal route can be formed. This can be achieved by processing and evaluating all the received

RREQs, irrespective of their arrival time, at all nodes instead of dropping the late coming RREQ received after the first RREQ. Based on the hop-count, Nodes are allowed to perform a comparison between the current received RREQ with the previously received one in addition to the comparison of

“destination sequence number”. The result of the comparison

is used in deciding for further broadcasting, replying or

dropping the “RREQ” according to the following rules, as

illustrated in Figure 3.

5.1.1. In Case of Intermediate Node

Whenever "RREQ" has been received by intermediate node for first time, it should obey the following rules:

1- If the received RREQ has Overhear RREP, (with hop-count HS), in the Snoop Cache and RREP, (with hop- count

HRP), in the Route Cache. If HS <= HRP, then the RREQ

is dropped.

2- If the received RREQ has only Overhear RREP, then the RREQ is dropped.

3- If there is no Overhear RREP or HRP < HS, then the node

sends RREP with hop count HRP.

4- If there is neither Overhear RREP nor RREP, then the node attaches its address in "route record" of RREQ, and rebroadcast RREQ.

When the current received RREQ is not the first one has less hop-count (HRQ) than the previously received RREQ (HʹRQ),

then the node repeats the above steps form1 to 4. Otherwise, the late comer will be dropped by the node.

5.1.2. In Case of Target Node

When “RREQ” has been received by the target node for first

time, it should obey the following rules:

1- If there is neither Overhear RREP nor “RREP”, then the

target node transmits “RREP” through reverse path of the

received RREQ.

2- If there is only RREP, (with hop-count HRP), in the Route

Cache. If HRQ < HRP, then destination node sends RREP

through the reverse path of the received RREQ. Otherwise, the node sends RREP with hop counts HRP.

3- If there is only Overhear RREP, (with hop-count HS), in the

Snoop Cache. If HRQ < HS, then destination node sends

RREP through the reverse path of the received RREQ. Otherwise, the node drops RREQ.

If the received RREQ has Overhear RREP, (with hop-count HS), in the Snoop Cache and RREP, (with hop-count HRP), in

the Route Cache. If HS > HRQ < HRP, then the target node sends

RREP through the reverse path of the received RREQ. Else if HRQ >= HS <= HRP, then the RREQ is dropped. Otherwise, the

(5)

RESEARCH ARTICLE

Figure 3. Flow Chart that Shows Action of Node on Receiving Route Request Packet

Start

Node S needs to send Data to node D

Is it has vali d route Broadcast Rq

Is Dest

node Is 1

st

Rq

Is it has overhear in snoop cashe

Is it has route in Reply cache

Send RREP through reverse

path of Rq Is 1st Rq

HRq < H`Rq

H`Rq =: HRq

Is it has overhear in snoop cache Is it has

rout in Reply cache

Is it has rout in Reply cache

HRq < H`Rq

HS HRp

Is it has rout in Reply cache

Is HS> HRq < HRp

Is HRq HS HRp

HRq< HRp

HRq< HS

H`Rq =: HRq

Set reverse path & Broadcast Rq

Send RREP of route reply cache

with HRp

End

Send data to the next node in the route

Is there data

`

Rq: Route request Rp: Route reply

HRq: Hop count in the current Rq H`

Rq: Hop count in the previous Rq

HRp: Hop count in Rp

Hs: Hop count in snoop cache (overhear)

Y N

Y

Y

Y

Y Y

Y Y

Y

Y Y

Y Y Y

Y Y

Y

Y N

N

N

N N

N N

N

N N

N

N N

N

N N

Y

N N

(6)

RESEARCH ARTICLE

Figure 4 Flow Chart That Shows Action of Nodes on Receiving Overhear Route Reply

Figure 5 Flow Chart That Shows Action of Nodes on Receiving Route Reply

N N

Y Y

Y Start

Overheard RREP

Is 1st

one

Is it Has route reply

in Reply Cac he Store in Snoop Cache

HS<HʹS

HʹS =: HS

Drop Overhear

RREP

Hs≤ HRp

End

HRp : Hop count of rout reply in reply c ache

HS : Hop count in the current ove rhear reply HʹS : Hop count in the pre vious overhear re ply

N

Y N

Start

Receive RREP

Is 1st one

Is it Has overheard reply in Snoop Cache

Store in Reply Cache and Forward It HRp<HʹRp

HʹRp =: HRp

Drop

RREP HRp< Hs

End

HRp : Hop count in current RREP HʹRp : Hop count in previous RREP

HS : Hop count in snoop cache (overhe ard)

Y N

Y Y

Y

N

(7)

RESEARCH ARTICLE

5.2.Unnecessary Route Reply Suppression

The unnecessary Route Reply Suppression is handled by adding a feature to AODV nodes so as to Overhear RREP packet that is not directed to it. In the proposed algorithm, the Overheard RREP is examined for further processing. To facilitate the searching and comparison in the Route Cache and Snoop Cache, we have included additional information in the

“RREP packet” such as “broadcast ID” of the respective “RREQ”, total hops number among the originator and target

node, and originator address that will help to determine further processing. On hearing RREP by a node (i.e. RREP not directed to a node), it obeys the following rules, as shown in Figure 4.

1- If Overheard RREP, with hop-count HS, is the first one and

there is no RREP in the Reply Cache for the same required route, then the Overheard RREP is stored in Snoop Cache. In the case of there is RREP in the Reply Cache with hop count HRP and HS < HRP, then also the Overheard RREP is

stored in Snoop Cache. Otherwise, if HS > HRP, then the

Overheard RREP is dropped.

2- If the current Overheard RREP is not the first one has less hop-count HS than the previously received one with HʹS,

then the node repeats step1. Otherwise, the node drops the late comer.

In the case of receiving RREP by a node (i.e. RREP directed to a node), it obeys the same above two steps, as shown in Figure 5.

6. SIMULATION ENVIRONMENT 6.1. Simulation Model

Table 1: Simulation Parameters

To test and evaluate the performance of the proposed scheme, we used simulation system, named NS2. AWK command has

been used to analyze the experimental results contained in the generated output trace files. The traffic sources that we have used are Continuous Bit Rate (CBR). Node mobility

description is based on the "random waypoint model”. The pause time is varied from 0 to 500 second. A pause time 0 sec. means the nodes are continuously in motion and pause time 500 sec. means nodes are stationary. Table 1 illustrates the simulation parameters.

6.2.Performance Metrics

The performance comparison of suggested algorithm (AODV_MOD) against the standard “AODV” have been carried

out under the same conditions, such as identical mobility and traffic scenarios. To evaluate the two algorithms in all important aspects, the following three performance metrics have been used.

1. “Packet Delivery Fraction” (PDF): It is the ratio of number

of received data packets at the target node to the number of data packets transmitted from the originating node. Where, high PDF meets good performance.

2. “Average End-to-End Delay”: it is the consumed average

time during journey of data packets from the originating node to the target node. It involves "processing time", "waiting time" and "propagation delay". Where, minimum

“end-to-end delay” meets better performance.

“Normalized Routing Overhead”: It is the ratio of sum of all

transmitted routing packets to the sum of all data packets

delivered to the target. Where, minimum “Normalized Routing Overhead” ratio meets better performance.

7. SIMULATION RESULTS AND ANALYSIS The following scenarios have been taken into consideration to compare the simulation results of the proposed AODV_MOD

and the original AODV, based on the aforementioned performance metrics.

7.1.Scenario 1:

In this scenario, the pause time of nodes is changed from 0 to 500 sec. The number of nodes and source connections is fixed at 50 and 25 respectively, node speed is fixed at 5 m/s and the other network parameters are considered as in Table1. 7.1.1. Packet Delivery Fraction

Figure 6.a shows PDF versus pause time for the studied protocols. It is clearly seen from the graph that as the pause time increases, the PDF of both protocols increases because the network becomes stable since the routes are stable and valid for a long time. On the other hand, lower pause time (i.e., nodes have higher mobility) results in lower PDF due to the increase of packet drops, since the routes are unstable. The AODV_MOD

has a higher delivery ratio, where the average PDF=88.63%, than the original AODV, where the average PDF=69.09%, this Simulation Parameters Values

Simulator NS2 (V 2.35) Topology Size 800m x400m Number of Nodes 50 – 90 Transmission Range 250m Channel Type Wireless MAC Layer 802.11

Radio propagation Model Two Ray Ground Interface Queue Length 50

(8)

RESEARCH ARTICLE

is due to the enhanced route discovery mechanism. In general, the large route length leads to the high probability of packets drop. The AODV_MOD can create shorter route length, which

result in the improvement of PDF. For the same reason, the improvement of PDF of AODV_MOD is more observable in a

high dynamic network.

7.1.2. Average End-to-End Delay

Figure 6.b illustrates the “end-to-end delay” of the two routing protocols. We note that, the delay time for both protocols decreases with increasing the pause time because as the mobility decreases the network becomes stable and the routes are available for long periods. The AODV_MODhas lower “end

-to-end delay”, where the average delay=0.77sec, than the original AODV, where the average delay= 1.61sec. This is because the enhanced route discovery mechanism can create shorter route than that taken by the original AODV, which

results in reduction of the “end-to-end delay”. 7.1.3. Normalized Routing Overhead

Normalized routing overhead versus pause time for the studied protocols is shown in Figure 6.c. We note that, as the mobility of nodes increases (i.e., at low pause time), the possibility of link failure increases and hence, the routing overhead increases, due to the rediscovery of the route, in the two protocols. The routing overhead of AODV_MOD, (Avg.

NRL=1.18), is lower than the original AODV, (Avg. NRL=1.18), because the enhanced route discovery mechanism can avoid unnecessary route reply packets from flooding the network.

(a)

(b)

(c)

Figure 6. Varying Network Pause Time 7.2.Scenario 2

Effect of node speed on performance of the AODV and AODV_MOD is addressed in this scenario. The nodes speed is

varied between 5m/sec and 55m/sec. The nodes number and source connections are fixed at 50 and 25 respectively, pause time is fixed at 5 sec. and the other network parameters are listed in Table1.

7.2.1. Packet Delivery Fraction (PDF)

Figure 7.a shows the packet delivery fraction against nodes speed of the AODV and AODV_MOD. PDF for both two

protocols decreases as the mobility speed increases, because at high speeds, possibility of link failure may occur more recurrently and therefore the PDF is decreased. The AODV_MOD has a higher delivery ratio under the same node

speed due to the enhanced route discovery mechanism, where the ideal (shorter) route is selected.

7.2.2. Average End-to-End Delay

Figure 7.b illustrates the "average end-to-end delay" versus nodes speed of the AODV and AODV_MOD. We observe that, the average delay of both two protocols increases as the mobility speed increases. This due to, the frequent changing of network topology results in high probability of links failure which in turns may lead to extra "route discovery process", so the average delay have been increased. Also, we note that, in case of dynamic topology, the AODV_MOD has better performance than "AODV" because the proposed scheme can create shorter path than that taken by the original AODV, which leads to reduction of the "end-to-end delay".

7.2.3. Normalized Routing Overhead

(9)

RESEARCH ARTICLE

AODV_MOD, (Avg. NRL= 3.01), is lower than the original

AODV, (Avg. NRL= 4.14), because it suppresses unnecessary route reply packets from flooding the network.

(a)

(b)

(c)

Figure 7 Varying Network Mobility Speed 7.3.Scenario 3

The effect of nodes density on performance of the two routing protocols is addressed in this scenario. We have varied the number of nodes from 50 to 90 with step 5, keeping the pause time to be 5 sec, node speed is 10m/s and number of source connections is 45. Other parameters remain fixed as shown in Table 1.

As shown in Figure 8, as the nodes density increases, the coinciding packets from various originating nodes may have

higher likelihood in channel contention at the same intermediate nodes, which results in lower packet delivery ratio, higher delay and higher normalized overhead. The AODV_MOD has better performance than AODV because the enhanced route discovery mechanism can avoid the unnecessary control packets and create shorter route than that taken by the original AODV under the same number of nodes,

which is useful to improve the “packet delivery ratio, diminish the “end-to-end delay” and control packets.

(a)

(b)

(c) 8.CONCLUSION

(10)

RESEARCH ARTICLE

formation and the second one, suppression of unimportant control packets. And it is compared with the original "AODV", for different scenarios, in terms of "packets delivery fraction", "end-to-end delay" and "normalized routing overhead". It is observed that, the AODV_MOD has better performance than the original "AODV".

REFERENCES

[1] Schiller J.,”Mobile Communications”, Addison Wesley, 2nd edition, 2003.

[2] Ravneet kaur, Dr.Neeraj Sharma, “Dynamic node recovery in MANET for high recovery probability”, International Journal of Computer Networks and Applications (IJCNA), Vol 2, Issue 4, July - August 2015. [3] Shaheen Khan, Javed Khan Bhutto and Gautam Pandit,”Reactive and Proactive Routing Protocol Performance Evaluation for Quantitative Analysis in MANET”, International Journal of Scientific Research and Education, Vol. 2, Issue12, pp: 2540-2551, December 2014.

[4] Chandni, Sharad Chauhan and Kamal Kumar Sharma,”Routing Protocol in MANET – A Survey”, International Journal of Recent Research Aspects, Vol.1, Issue 2, pp: 48-52, September 2014.

[5] Rajeshwar Sharma, Tarun Sharma and Aditi Kalia ,”A Comparative Review on Routing Protocols in MANET”, International Journal of Computer Applications, Vol. 133, No.1, January 2016.

[6] Saima Zafar, Hina Tariq, Kanza Manzoor,” Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks,” International Journal of Computer Networks and Applications (IJCNA) ,Vol. 3, Issue 2, March – April 2016.

[7] C. Perkins, E. Belding Royer and S. Das,”Ad-Hoc On Demand Distance Vector (AODV) Routing”, rfc 3561, July 2003.

[8] Vinayak Bashetti, Sayed Abdulhayan,” A Cost Effective Flooding Algorithm for AODV Routing Protocol in Mobile Ad Hoc Network”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2016.

[9] P. Wannawilai and C. Sathitwiriyawong ,“AODV with Sufficient Bandwidth Aware Routing Protocol”, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp: 281-285, June28 – July 2, 2010.

[10] Ashraf Abu-Ein and Jihad Nader,”An Enhanced AODV Routing Protocol for MANETs”, International Journal of Computer Science Issues, Vol. 11, Issue 1, No 1, January 2014.

[11] Julith Jacob and Shinu Koyakutty,”An Improved Flooding Scheme for AODV Routing Protocol in MANETs”, International Journal of Advanced Trends in Computer Science and Engineering, Vol. 3, No. 4, pp: 83-89, September 2014.

[12] Priyaganga Guruswamy, Madhumita Chatterjee,” A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks”, International Journal of Computer Networks and Applications (IJCNA), Vol. 3, Issue 2, March – April 2016.

[13] Perkins C. and E. Royer,“Ad-Hoc On-Demand Distance Vector Routing”, Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp:90-100, February1999.

[14] Prashant Kumar Maurya, Gaurav Sharma, et al,”An Overview of AODV Routing Protocol”, International Journal of Modern Engineering Research, Vol.2, Issue.3, pp:728-732, May-June 2012.

[15] Abdul Hadi A. R. and Zuriati A. Z.,”Performance Comparison of AODV, DSDV, and I-DSDV Routing Protocols in Mobile Ad Hoc Networks”, European Journal of Scientific Research, Vol. 31, No. 4, pp: 566-576, 2009.

[16] M. Krishnamoorthi and Dr. K. Gokulraj,” A Study on AODV and DSR MANET Routing Protocols”, International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.5, No 4, pp: 549-555, August 2015.

[17] Kalpana Sharma, Neha Mittal and Priyanka Rathi,”Comparative Analysis of Routing Protocols in Ad-Hoc Networks”, International Journal of Advanced Science and Technology Vol.69, pp:1-12, 2014.

[18] D. B. Jagannadha Rao, Karnam Sreenu and Parsi Kalpana,” A Study on Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 8, October 2012.

[19] David B. Johnson, David A. Maltz. “Dynamic Source Routing in Ad- Hoc Wireless Networks”, In Mobile Computing, Vol. 353, chapter 5, pp: 153-181, Kluwer Academic Publishers, 1996.

[20] Boon-Chong, Seet-Bu Sung Lee and Chiew-Tong Lau,”Optimization of Route Discovery for Dynamic Source Routing in Wireless Ad Hoc Networks”, IEE Electronics Letters, Vol. 39, No. 22, pp: 1606-1607. October 2003.

Authors

May Sayed A. Nouh is a lecturer at the electronics and communications Dept., the higher technological institute tenth of Ramadan city, Cairo, Egypt. She received her B.Sc. from higher technological institute tenth of Ramadan city in 2010. Since then, she served in different positions and built both practical and theoretical experience in electronics and communications field. Her areas of interest include mobile systems, networks and wireless communications. She supervised on different training students in industrial areas.

Salwa H. EL-Ramly received the B.Sc. and M.Sc. degrees from Ain Shams University, Cairo, Egypt in 1967 and 1969 respectively. She received her D.E.A. (Diplome d'Etudes Approfondies en Electronique) from Grenoble University, France. In 1976, she received her PhD in Electrical Engineering (Communications) from Nancy University, France. From 1976 to August 1982 she was an assistant professor in the Electronics and Communication Engineering Dept., Faculty of Engineering, Ain Shams University. After which she served for 5 years, as an Associate Professor, in the same Faculty. Since 1989 she is a professor of communications systems in the same department where she is also the director of the "Signal Processing & Communications Research Lab" (CSPRL).

M. Zaki is the professor of software engineering, Computer and System Engineering Department, Faculty of Engineering, Al-Azhar University at Cairo. He received his B.Sc. and M.Sc. degrees in electrical engineering from Cairo University in 1968 and 1973 respectively. He received his Ph. D. degrees in computer engineering from Warsaw Technical University, Poland in 1977. His fields of interest include artificial intelligence, soft computing, and distributed systems.

Gambar

Figure 2 Generation of Unnecessary RREP
Figure 3. Flow Chart that Shows Action of Node on Receiving Route Request Packet
Figure 4 Flow Chart That Shows Action of Nodes on Receiving Overhear Route Reply
Table 1: Simulation Parameters
+3

Referensi

Dokumen terkait

Maros| 110 Langsung saja saya akan menyebutkan nama dan identitasnya, yang pertama Dzul Akhyar asal daerah Maros selaku kordes (kordinator desa) dari fakultas Adab

The broad purposes of this project were to investigate five areas: (1) investigate the speech varieties currently spoken among the tribes of Palakkad and their relationship with

Dalam penelitian ini untuk mengukur kepuasan kerja dan kinerja pegawai di Lingkup Pemerintah Kabupaten Konawe hanya menggunakan dua variable yaitu Imbalan dan Gaya

Yang bertanda tangan dibawah ini, menerangkan bahwa Tugas Akhir Mahasiswa. Program Diploma 3 Teknik

bagi mahasiswa khususnya dan bagi peternak umumnya sehingga dapat memberikan gambaran mengenai perlakuan ransum kering dan basah dengan penambahan probiotik

PEMERINTAH KOTA TANGERANG http://www.tangerangkota.go.id.. Program Penataan penguasaan, pemilikan, penggunaan dan pemanfaatan

Berdasarkan hasil penilaian kinerjaatribut bauran pemasaran pisang goreng kipas dibandingkan dengan tingkat kepentingan konsumen, didapatkan suatu perhitungan melalui

Sampel adalah pelajar yang mengalami gangguan tidur berdasarkan kuesioner Sleep Disturbance Scale for Children (SDSC).. Pengukuran tinggi badan dan tekanan darah dilakukan